Compare commits
1 Commits
timetrex
...
d42dfc8c5c
Author | SHA1 | Date | |
---|---|---|---|
d42dfc8c5c |
2
.gitignore
vendored
2
.gitignore
vendored
@@ -1,5 +1,3 @@
|
|||||||
.ansible_vault
|
|
||||||
.bitwarden
|
|
||||||
environments
|
environments
|
||||||
*.log
|
*.log
|
||||||
.playbook
|
.playbook
|
||||||
|
2
Makefile
2
Makefile
@@ -2,7 +2,7 @@ all: vagrant
|
|||||||
|
|
||||||
vagrant:
|
vagrant:
|
||||||
vagrant up --no-destroy-on-error --no-color | tee ./vagrantup.log
|
vagrant up --no-destroy-on-error --no-color | tee ./vagrantup.log
|
||||||
./scripts/forward-ssh.sh
|
./forward-ssh.sh
|
||||||
|
|
||||||
clean:
|
clean:
|
||||||
vagrant destroy -f --no-color
|
vagrant destroy -f --no-color
|
||||||
|
19
README.md
19
README.md
@@ -10,27 +10,8 @@ and services operated by Free I.T. Athens (FRITA).
|
|||||||
3. Go to
|
3. Go to
|
||||||
- [Traefik Dashboard](https://traefik.local.freeitathens.org:8443/dashboard/#/)
|
- [Traefik Dashboard](https://traefik.local.freeitathens.org:8443/dashboard/#/)
|
||||||
- [WordPress](https://www.local.freeitathens.org)
|
- [WordPress](https://www.local.freeitathens.org)
|
||||||
- [Nextcloud](https://cloud.local.freeitathens.org)
|
|
||||||
4. Click through the HTTPS security warning
|
4. Click through the HTTPS security warning
|
||||||
|
|
||||||
## Production
|
|
||||||
1. Clone [production-env](https://github.com/freeitathens/production-env/) to `./environments`
|
|
||||||
|
|
||||||
```
|
|
||||||
mkdir -p environments
|
|
||||||
git clone git@github.com:freeitathens/production-env.git ./environments
|
|
||||||
```
|
|
||||||
|
|
||||||
2. Run `./scripts/vault-key.sh` from the root of the project to obtain the Ansible Vault password
|
|
||||||
3. Enter the Bitwarden Master Password
|
|
||||||
4. Run `ansible-playbook` against the production servers, e.g.,
|
|
||||||
|
|
||||||
```
|
|
||||||
ansible-playbook -u root -i environments/production --vault-pass-file ./.ansible_vault webserver.yml --check
|
|
||||||
```
|
|
||||||
|
|
||||||
5. Delete the `.ansible_vault` file when you are done
|
|
||||||
|
|
||||||
## Authors
|
## Authors
|
||||||
* **Kris Lamoureux** - *Project Founder* - [@krislamo](https://github.com/krislamo)
|
* **Kris Lamoureux** - *Project Founder* - [@krislamo](https://github.com/krislamo)
|
||||||
|
|
||||||
|
10
Vagrantfile
vendored
10
Vagrantfile
vendored
@@ -24,19 +24,11 @@ Vagrant.configure("2") do |config|
|
|||||||
config.vm.define :frita do |frita| #
|
config.vm.define :frita do |frita| #
|
||||||
end
|
end
|
||||||
|
|
||||||
# Set libvirt settings
|
# Disable Machine Name Prefix
|
||||||
config.vm.provider :libvirt do |libvirt|
|
config.vm.provider :libvirt do |libvirt|
|
||||||
libvirt.cpus = 2
|
|
||||||
libvirt.memory = 4096
|
|
||||||
libvirt.default_prefix = ""
|
libvirt.default_prefix = ""
|
||||||
end
|
end
|
||||||
|
|
||||||
# Set VirtualBox settings
|
|
||||||
config.vm.provider "virtualbox" do |vbox|
|
|
||||||
vbox.cpus = 2
|
|
||||||
vbox.memory = 4096
|
|
||||||
end
|
|
||||||
|
|
||||||
# Provision with Ansible
|
# Provision with Ansible
|
||||||
config.vm.provision "ansible" do |ansible|
|
config.vm.provision "ansible" do |ansible|
|
||||||
ENV['ANSIBLE_ROLES_PATH'] = File.dirname(__FILE__) + "/roles"
|
ENV['ANSIBLE_ROLES_PATH'] = File.dirname(__FILE__) + "/roles"
|
||||||
|
@@ -1,12 +1,8 @@
|
|||||||
###############
|
###############
|
||||||
### Secrets ###
|
### Secrets ###
|
||||||
###############
|
###############
|
||||||
# These are sample public passwords not encrypted in Ansible Vault, unlike production
|
|
||||||
secret:
|
secret:
|
||||||
TRAEFIK_DREAMHOST_APIKEY: DHap1pa55w0rd!
|
|
||||||
WORDPRESS_DB_PASSWORD: WPpa55w0rd!
|
WORDPRESS_DB_PASSWORD: WPpa55w0rd!
|
||||||
NEXTCLOUD_MYSQL_PASSWORD: NCdbpa55w0rd!
|
|
||||||
NEXTCLOUD_ADMIN_PASSWORD: NCadm1npa55w0rd!
|
|
||||||
|
|
||||||
##############
|
##############
|
||||||
### Docker ###
|
### Docker ###
|
||||||
@@ -20,8 +16,6 @@ docker_users:
|
|||||||
databases:
|
databases:
|
||||||
- name: wordpress
|
- name: wordpress
|
||||||
pass: "{{ secret.WORDPRESS_DB_PASSWORD }}"
|
pass: "{{ secret.WORDPRESS_DB_PASSWORD }}"
|
||||||
- name: nextcloud
|
|
||||||
pass: "{{ secret.NEXTCLOUD_MYSQL_PASSWORD }}"
|
|
||||||
|
|
||||||
#######################
|
#######################
|
||||||
### Webserver Stack ###
|
### Webserver Stack ###
|
||||||
@@ -38,9 +32,8 @@ webserver:
|
|||||||
#TRAEFIK_WEB_ENABLED: true
|
#TRAEFIK_WEB_ENABLED: true
|
||||||
TRAEFIK_DEBUG: true
|
TRAEFIK_DEBUG: true
|
||||||
TRAEFIK_ACME_PROVIDER: dreamhost
|
TRAEFIK_ACME_PROVIDER: dreamhost
|
||||||
TRAEFIK_ACME_CASERVER: https://localhost/directory
|
TRAEFIK_ACME_CASERVER: https://acme-v02.api.letsencrypt.org/directory
|
||||||
TRAEFIK_ACME_EMAIL: admin@example.org
|
TRAEFIK_ACME_EMAIL: frita@example.org
|
||||||
TRAEFIK_DREAMHOST_APIKEY: "{{ secret.TRAEFIK_DREAMHOST_APIKEY }}"
|
|
||||||
|
|
||||||
#################
|
#################
|
||||||
### WordPress ###
|
### WordPress ###
|
||||||
@@ -50,18 +43,4 @@ webserver:
|
|||||||
#WORDPRESS_DB_HOST: host.docker.internal
|
#WORDPRESS_DB_HOST: host.docker.internal
|
||||||
#WORDPRESS_DB_NAME: wordpress
|
#WORDPRESS_DB_NAME: wordpress
|
||||||
#WORDPRESS_DB_USER: wordpress
|
#WORDPRESS_DB_USER: wordpress
|
||||||
#WORDPRESS_WEB_ENABLED: true
|
|
||||||
WORDPRESS_DB_PASSWORD: "{{ secret.WORDPRESS_DB_PASSWORD }}"
|
WORDPRESS_DB_PASSWORD: "{{ secret.WORDPRESS_DB_PASSWORD }}"
|
||||||
|
|
||||||
#################
|
|
||||||
### Nextcloud ###
|
|
||||||
#################
|
|
||||||
#NEXTCLOUD_VERSION: stable
|
|
||||||
#NEXTCLOUD_DOMAIN: cloud.local.freeitathens.org
|
|
||||||
#NEXTCLOUD_MYSQL_HOST: host.docker.internal
|
|
||||||
#NEXTCLOUD_MYSQL_DATABASE: nextcloud
|
|
||||||
#NEXTCLOUD_MYSQL_USER: nextcloud
|
|
||||||
#NEXTCLOUD_WEB_ENABLED: true
|
|
||||||
#NEXTCLOUD_ADMIN: admin
|
|
||||||
NEXTCLOUD_ADMIN_PASSWORD: "{{ secret.NEXTCLOUD_ADMIN_PASSWORD }}"
|
|
||||||
NEXTCLOUD_MYSQL_PASSWORD: "{{ secret.NEXTCLOUD_MYSQL_PASSWORD }}"
|
|
||||||
|
@@ -1,2 +0,0 @@
|
|||||||
packages:
|
|
||||||
- dnsutils
|
|
@@ -4,12 +4,6 @@
|
|||||||
state: directory
|
state: directory
|
||||||
mode: 0700
|
mode: 0700
|
||||||
|
|
||||||
- name: Install useful software
|
|
||||||
ansible.builtin.apt:
|
|
||||||
name: "{{ packages }}"
|
|
||||||
state: present
|
|
||||||
update_cache: true
|
|
||||||
|
|
||||||
- name: Install the Uncomplicated Firewall
|
- name: Install the Uncomplicated Firewall
|
||||||
ansible.builtin.apt:
|
ansible.builtin.apt:
|
||||||
name: ufw
|
name: ufw
|
||||||
|
140
roles/nextcloud/tasks/main.yml
Normal file
140
roles/nextcloud/tasks/main.yml
Normal file
@@ -0,0 +1,140 @@
|
|||||||
|
# Copyright (C) 2019-2020 Free I.T. Athens
|
||||||
|
#
|
||||||
|
# This program is free software: you can redistribute it and/or modify
|
||||||
|
# it under the terms of the GNU General Public License as published by
|
||||||
|
# the Free Software Foundation, version 3 of the License.
|
||||||
|
#
|
||||||
|
# This program is distributed in the hope that it will be useful,
|
||||||
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
# GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public License
|
||||||
|
# along with this program. If not, see <https://www.gnu.org/licenses/>.
|
||||||
|
|
||||||
|
- name: Install MySQL Support for Python
|
||||||
|
apt:
|
||||||
|
name: python-pymysql
|
||||||
|
state: present
|
||||||
|
|
||||||
|
- name: Create Database
|
||||||
|
mysql_db:
|
||||||
|
name: "{{ nc_db_name }}"
|
||||||
|
state: present
|
||||||
|
login_unix_socket: /var/run/mysqld/mysqld.sock
|
||||||
|
|
||||||
|
- name: Create Database User
|
||||||
|
mysql_user:
|
||||||
|
name: "{{ nc_db_user }}"
|
||||||
|
password: "{{ nc_db_pass }}"
|
||||||
|
priv: "{{ nc_db_name }}.*:ALL,GRANT"
|
||||||
|
state: present
|
||||||
|
login_unix_socket: /var/run/mysqld/mysqld.sock
|
||||||
|
|
||||||
|
- name: Install PHP Modules
|
||||||
|
apt:
|
||||||
|
name: [
|
||||||
|
# Required
|
||||||
|
'php-ctype', 'php-curl', 'php-dom',
|
||||||
|
'php-gd', 'php-iconv', 'php-json', 'php-xml',
|
||||||
|
'php-mbstring', 'php-posix', 'php-simplexml',
|
||||||
|
'php-xmlreader', 'php-xmlwriter', 'php-zip',
|
||||||
|
|
||||||
|
# Database Connectors
|
||||||
|
'php-pgsql',
|
||||||
|
|
||||||
|
# Recommended Packages
|
||||||
|
'php-fileinfo', 'php-bz2', 'php-intl',
|
||||||
|
|
||||||
|
# Enhanced Performance
|
||||||
|
'php-redis', 'redis-server',
|
||||||
|
|
||||||
|
# Preview Generation
|
||||||
|
'php-imagick'
|
||||||
|
]
|
||||||
|
state: present
|
||||||
|
notify: Reload Apache2
|
||||||
|
|
||||||
|
- name: Create Public HTML Directory
|
||||||
|
file:
|
||||||
|
path: "{{ nc_dir }}/public_html"
|
||||||
|
state: directory
|
||||||
|
|
||||||
|
- name: Create Nextcloud Directories
|
||||||
|
file:
|
||||||
|
path: "{{ nc_dir }}/public_html/data"
|
||||||
|
state: directory
|
||||||
|
owner: www-data
|
||||||
|
group: www-data
|
||||||
|
|
||||||
|
- name: Create Logs Directory
|
||||||
|
file:
|
||||||
|
path: "{{ nc_dir }}/logs"
|
||||||
|
state: directory
|
||||||
|
|
||||||
|
- name: Download Nextcloud
|
||||||
|
get_url:
|
||||||
|
url: "https://download.nextcloud.com/server/releases/\
|
||||||
|
nextcloud-{{ nc_version }}.tar.bz2"
|
||||||
|
dest: /tmp/nextcloud-{{ nc_version }}.tar.bz2
|
||||||
|
checksum: sha256:{{ nc_sha256_hash }}
|
||||||
|
|
||||||
|
- name: Extract Nextcloud
|
||||||
|
unarchive:
|
||||||
|
src: /tmp/nextcloud-{{ nc_version }}.tar.bz2
|
||||||
|
dest: "{{ nc_dir }}/public_html"
|
||||||
|
owner: www-data
|
||||||
|
group: www-data
|
||||||
|
extra_opts: [--strip-components=1]
|
||||||
|
remote_src: yes
|
||||||
|
|
||||||
|
- name: Install Nextcloud
|
||||||
|
command: |
|
||||||
|
php occ maintenance:install --database mysql \
|
||||||
|
--database-name {{ nc_db_name }} --database-host {{ nc_db_host }} \
|
||||||
|
--database-user {{ nc_db_user }} --database-pass {{ nc_db_pass }} \
|
||||||
|
--admin-user {{ nc_admin }} --admin-pass {{ nc_admin_pass }} \
|
||||||
|
--data-dir {{ nc_dir }}/public_html/data
|
||||||
|
become_user: www-data
|
||||||
|
register: nextcloud_install
|
||||||
|
args:
|
||||||
|
chdir: "{{ nc_dir }}/public_html"
|
||||||
|
creates: "{{ nc_dir }}/public_html/config/config.php"
|
||||||
|
|
||||||
|
- name: Add Missing Database Indexes
|
||||||
|
command: php occ db:add-missing-indices
|
||||||
|
become_user: www-data
|
||||||
|
register: nextcloud_db_update
|
||||||
|
args:
|
||||||
|
chdir: "{{ nc_dir }}/public_html"
|
||||||
|
when: nextcloud_install.changed
|
||||||
|
|
||||||
|
- name: Convert Database Columns to BIGINT
|
||||||
|
command: php occ db:convert-filecache-bigint
|
||||||
|
become_user: www-data
|
||||||
|
args:
|
||||||
|
chdir: "{{ nc_dir }}/public_html"
|
||||||
|
when: nextcloud_db_update.changed
|
||||||
|
|
||||||
|
- name: Add Domain Name to Trusted Domains
|
||||||
|
command: |
|
||||||
|
php occ config:system:set trusted_domains 0 --value={{ nc_domain }}
|
||||||
|
become_user: www-data
|
||||||
|
args:
|
||||||
|
chdir: "{{ nc_dir }}/public_html"
|
||||||
|
when: nextcloud_install.changed
|
||||||
|
|
||||||
|
- name: "Enable Apache2 Module: rewrite"
|
||||||
|
apache2_module: name=rewrite state=present
|
||||||
|
|
||||||
|
- name: Apply Apache Configuration
|
||||||
|
template:
|
||||||
|
src: nextcloud.conf.j2
|
||||||
|
dest: /etc/apache2/sites-available/{{ nc_domain }}.conf
|
||||||
|
notify: Reload Apache2
|
||||||
|
|
||||||
|
- name: Enable Apache Website
|
||||||
|
shell: a2ensite {{ nc_domain }}
|
||||||
|
args:
|
||||||
|
creates: /etc/apache2/sites-enabled/{{ nc_domain }}.conf
|
||||||
|
notify: Reload Apache2
|
27
roles/nextcloud/templates/nextcloud.conf.j2
Normal file
27
roles/nextcloud/templates/nextcloud.conf.j2
Normal file
@@ -0,0 +1,27 @@
|
|||||||
|
<VirtualHost *:80>
|
||||||
|
ServerName {{ nc_domain }}
|
||||||
|
|
||||||
|
ServerAdmin {{ nc_admin_email }}
|
||||||
|
DocumentRoot {{ nc_dir }}/public_html
|
||||||
|
|
||||||
|
<Directory {{ nc_dir }}/public_html>
|
||||||
|
|
||||||
|
Options +FollowSymLinks
|
||||||
|
AllowOverride All
|
||||||
|
|
||||||
|
<IfModule mod_dav.c>
|
||||||
|
Dav off
|
||||||
|
</IfModule>
|
||||||
|
|
||||||
|
SetEnv HOME {{ nc_dir }}/public_html
|
||||||
|
SetEnv HTTP_HOME {{ nc_dir }}/public_html
|
||||||
|
|
||||||
|
# Nextcloud recommends 512MB
|
||||||
|
php_value memory_limit 512M
|
||||||
|
</Directory>
|
||||||
|
|
||||||
|
ErrorLog {{ nc_dir }}/logs/error.log
|
||||||
|
CustomLog {{ nc_dir }}/logs/access.log combined
|
||||||
|
</VirtualHost>
|
||||||
|
|
||||||
|
# vim: syntax=apache ts=4 sw=4 sts=4 sr noet
|
@@ -1,5 +1,4 @@
|
|||||||
webserver_root: "{{ docker_compose_root }}/webserver"
|
webserver_root: "{{ docker_compose_root }}/webserver"
|
||||||
nextcloud_autoinstall: true
|
|
||||||
mariadb_trust:
|
mariadb_trust:
|
||||||
- "172.16.0.0/12"
|
- "172.16.0.0/12"
|
||||||
- "192.168.0.0/16"
|
- "192.168.0.0/16"
|
||||||
|
@@ -2,14 +2,10 @@ version: '3.5'
|
|||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
wordpress:
|
wordpress:
|
||||||
nextcloud:
|
|
||||||
postgres:
|
|
||||||
|
|
||||||
networks:
|
networks:
|
||||||
traefik:
|
traefik:
|
||||||
name: traefik
|
name: traefik
|
||||||
postgres:
|
|
||||||
name: postgres
|
|
||||||
|
|
||||||
services:
|
services:
|
||||||
traefik:
|
traefik:
|
||||||
@@ -18,7 +14,6 @@ services:
|
|||||||
command:
|
command:
|
||||||
- --api.dashboard=${TRAEFIK_DASHBOARD:-true}
|
- --api.dashboard=${TRAEFIK_DASHBOARD:-true}
|
||||||
- --api.debug=${TRAEFIK_DEBUG:-false}
|
- --api.debug=${TRAEFIK_DEBUG:-false}
|
||||||
- --log.level=${TRAEFIK_LOG_LEVEL:-ERROR}
|
|
||||||
- --providers.docker=true
|
- --providers.docker=true
|
||||||
- --providers.docker.exposedbydefault=${TRAEFIK_EXPOSED_DEFAULT:-false}
|
- --providers.docker.exposedbydefault=${TRAEFIK_EXPOSED_DEFAULT:-false}
|
||||||
- --entrypoints.web.address=:80
|
- --entrypoints.web.address=:80
|
||||||
@@ -28,28 +23,23 @@ services:
|
|||||||
- --entrypoints.web.http.redirections.entrypoint.scheme=https
|
- --entrypoints.web.http.redirections.entrypoint.scheme=https
|
||||||
- --entrypoints.web.http.redirections.entrypoint.permanent=true
|
- --entrypoints.web.http.redirections.entrypoint.permanent=true
|
||||||
- --certificatesresolvers.letsencrypt.acme.email=${TRAEFIK_ACME_EMAIL}
|
- --certificatesresolvers.letsencrypt.acme.email=${TRAEFIK_ACME_EMAIL}
|
||||||
- --certificatesresolvers.letsencrypt.acme.storage=/etc/letsencrypt/acme.json
|
- --certificatesresolvers.letsencrypt.acme.storage=acme.json
|
||||||
- --certificatesresolvers.letsencrypt.acme.dnschallenge=true
|
- --certificatesresolvers.letsencrypt.acme.dnschallenge.provider=${TRAEFIK_ACME_PROVIDER}
|
||||||
- --certificatesresolvers.letsencrypt.acme.dnschallenge.provider=${TRAEFIK_ACME_PROVIDER:-manual}
|
|
||||||
- --certificatesresolvers.letsencrypt.acme.dnschallenge.delaybeforecheck=0
|
- --certificatesresolvers.letsencrypt.acme.dnschallenge.delaybeforecheck=0
|
||||||
- --certificatesresolvers.letsencrypt.acme.caserver=${TRAEFIK_ACME_CASERVER:-https://acme-staging-v02.api.letsencrypt.org/directory}
|
- --certificatesresolvers.letsencrypt.acme.caserver=${TRAEFIK_ACME_CASERVER:-https://acme-staging-v02.api.letsencrypt.org/directory}
|
||||||
environment:
|
|
||||||
DREAMHOST_API_KEY: ${TRAEFIK_DREAMHOST_APIKEY}
|
|
||||||
ports:
|
ports:
|
||||||
- 80:80
|
- 80:80
|
||||||
- 443:443
|
- 443:443
|
||||||
- "127.0.0.1:8443:8443"
|
- "127.0.0.1:8443:8443"
|
||||||
volumes:
|
volumes:
|
||||||
- /var/run/docker.sock:/var/run/docker.sock
|
- /var/run/docker.sock:/var/run/docker.sock
|
||||||
- ./.acme:/etc/letsencrypt
|
|
||||||
labels:
|
labels:
|
||||||
traefik.http.routers.api.rule: Host(`${TRAEFIK_DOMAIN:-traefik.local.freeitathens.org}`)
|
traefik.http.routers.api.rule: Host(`${TRAEFIK_DOMAIN:-traefik.local.freeitathens.org}`)
|
||||||
traefik.http.routers.api.entrypoints: local
|
traefik.http.routers.api.entrypoints: local
|
||||||
traefik.http.routers.api.service: api@internal
|
traefik.http.routers.api.service: api@internal
|
||||||
traefik.http.routers.api.tls: true
|
traefik.http.routers.api.tls: true
|
||||||
traefik.http.routers.api.tls.certresolver: letsencrypt
|
traefik.http.routers.api.tls.domains[0].main: ${TRAEFIK_ROOT_DOMAIN:-local.freeitathens.org}
|
||||||
traefik.http.routers.api.tls.domains[0].main: ${TRAEFIK_ACME_DOMAIN_MAIN:-local.freeitathens.org}
|
traefik.http.routers.api.tls.domains[0].sans: "*.${TRAEFIK_ROOT_DOMAIN:-local.freeitathens.org}"
|
||||||
traefik.http.routers.api.tls.domains[0].sans: "${TRAEFIK_ACME_DOMAIN_SANS:-*.local.freeitathens.org}"
|
|
||||||
traefik.enable: ${TRAEFIK_WEB_ENABLED:-true}
|
traefik.enable: ${TRAEFIK_WEB_ENABLED:-true}
|
||||||
networks:
|
networks:
|
||||||
- traefik
|
- traefik
|
||||||
@@ -63,16 +53,9 @@ services:
|
|||||||
WORDPRESS_DB_USER: ${WORDPRESS_DB_USER:-wordpress}
|
WORDPRESS_DB_USER: ${WORDPRESS_DB_USER:-wordpress}
|
||||||
WORDPRESS_DB_PASSWORD: ${WORDPRESS_DB_PASSWORD}
|
WORDPRESS_DB_PASSWORD: ${WORDPRESS_DB_PASSWORD}
|
||||||
labels:
|
labels:
|
||||||
traefik.http.routers.wordpress.rule: Host(`${WORDPRESS_DOMAIN:-www.local.freeitathens.org}`,`${TRAEFIK_ACME_DOMAIN_MAIN:-local.freeitathens.org}`)
|
traefik.http.routers.wordpress.rule: Host(`${WORDPRESS_DOMAIN:-www.local.freeitathens.org}`)
|
||||||
traefik.http.routers.wordpress.entrypoints: websecure
|
traefik.http.routers.wordpress.entrypoints: websecure
|
||||||
traefik.http.routers.wordpress.middlewares: "wwwredirect"
|
|
||||||
traefik.http.routers.wordpress.tls: true
|
traefik.http.routers.wordpress.tls: true
|
||||||
traefik.http.routers.wordpress.tls.certresolver: letsencrypt
|
|
||||||
traefik.http.routers.wordpress.tls.domains[0].main: ${TRAEFIK_ACME_DOMAIN_MAIN:-local.freeitathens.org}
|
|
||||||
traefik.http.routers.wordpress.tls.domains[0].sans: "${TRAEFIK_ACME_DOMAIN_SANS:-*.local.freeitathens.org}"
|
|
||||||
traefik.http.middlewares.wwwredirect.redirectregex.regex: "^https://${TRAEFIK_ACME_DOMAIN_MAIN:-local.freeitathens.org}/(.*)"
|
|
||||||
traefik.http.middlewares.wwwredirect.redirectregex.replacement: "https://${WORDPRESS_DOMAIN:-www.local.freeitathens.org}/$${1}"
|
|
||||||
traefik.http.middlewares.wwwredirect.redirectregex.permanent: true
|
|
||||||
traefik.http.services.wordpress.loadbalancer.server.port: 80
|
traefik.http.services.wordpress.loadbalancer.server.port: 80
|
||||||
traefik.docker.network: traefik
|
traefik.docker.network: traefik
|
||||||
traefik.enable: ${WORDPRESS_WEB_ENABLED:-true}
|
traefik.enable: ${WORDPRESS_WEB_ENABLED:-true}
|
||||||
@@ -82,65 +65,3 @@ services:
|
|||||||
- traefik
|
- traefik
|
||||||
extra_hosts:
|
extra_hosts:
|
||||||
- host.docker.internal:host-gateway
|
- host.docker.internal:host-gateway
|
||||||
|
|
||||||
nextcloud:
|
|
||||||
image: nextcloud:${NEXTCLOUD_VERSION:-stable}
|
|
||||||
restart: always
|
|
||||||
environment:
|
|
||||||
MYSQL_HOST: ${NEXTCLOUD_MYSQL_HOST:-host.docker.internal:3306}
|
|
||||||
MYSQL_DATABASE: ${NEXTCLOUD_MYSQL_DATABASE-nextcloud}
|
|
||||||
MYSQL_USER: ${NEXTCLOUD_MYSQL_USER:-nextcloud}
|
|
||||||
MYSQL_PASSWORD: ${NEXTCLOUD_MYSQL_PASSWORD}
|
|
||||||
labels:
|
|
||||||
traefik.http.routers.nextcloud.rule: "Host(`${NEXTCLOUD_DOMAIN:-cloud.local.freeitathens.org}`)"
|
|
||||||
traefik.http.routers.nextcloud.entrypoints: websecure
|
|
||||||
traefik.http.routers.nextcloud.tls: true
|
|
||||||
traefik.http.routers.nextcloud.tls.certresolver: letsencrypt
|
|
||||||
traefik.http.routers.nextcloud.tls.domains[0].main: ${TRAEFIK_ACME_DOMAIN_MAIN:-local.freeitathens.org}
|
|
||||||
traefik.http.routers.nextcloud.tls.domains[0].sans: "${TRAEFIK_ACME_DOMAIN_SANS:-*.local.freeitathens.org}"
|
|
||||||
traefik.http.services.nextcloud.loadbalancer.server.port: 80
|
|
||||||
traefik.http.middlewares.nextcloud-webdav.redirectregex.regex: "https://(.*)/.well-known/(card|cal)dav"
|
|
||||||
traefik.http.middlewares.nextcloud-webdav.redirectregex.replacement: "https://$${1}/remote.php/dav/"
|
|
||||||
traefik.http.middlewares.nextcloud-webdav.redirectregex.permanent: true
|
|
||||||
traefik.http.routers.nextcloud.middlewares: nextcloud-webdav
|
|
||||||
traefik.docker.network: traefik
|
|
||||||
traefik.enable: ${NEXTCLOUD_WEB_ENABLED:-true}
|
|
||||||
volumes:
|
|
||||||
- nextcloud:/var/www/html
|
|
||||||
networks:
|
|
||||||
- traefik
|
|
||||||
extra_hosts:
|
|
||||||
- host.docker.internal:host-gateway
|
|
||||||
|
|
||||||
timetrex:
|
|
||||||
image: freeitathens/timetrex:${TIMETREX_VERSION:-latest}
|
|
||||||
restart: always
|
|
||||||
environment:
|
|
||||||
POSTGRES_PASSWORD: password
|
|
||||||
POSTGRES_HOST: postgres
|
|
||||||
links:
|
|
||||||
- postgres
|
|
||||||
labels:
|
|
||||||
traefik.http.routers.timetrex.rule: "Host(`${TIMETREX_DOMAIN:-time.local.freeitathens.org}`)"
|
|
||||||
traefik.http.routers.timetrex.entrypoints: websecure
|
|
||||||
traefik.http.routers.timetrex.tls: true
|
|
||||||
traefik.http.routers.timetrex.tls.certresolver: letsencrypt
|
|
||||||
traefik.http.routers.timetrex.tls.domains[0].main: ${TRAEFIK_ACME_DOMAIN_MAIN:-local.freeitathens.org}
|
|
||||||
traefik.http.routers.timetrex.tls.domains[0].sans: "${TRAEFIK_ACME_DOMAIN_SANS:-*.local.freeitathens.org}"
|
|
||||||
traefik.http.services.timetrex.loadbalancer.server.port: 80
|
|
||||||
traefik.docker.network: traefik
|
|
||||||
traefik.enable: ${NEXTCLOUD_WEB_ENABLED:-true}
|
|
||||||
networks:
|
|
||||||
- postgres
|
|
||||||
- traefik
|
|
||||||
|
|
||||||
postgres:
|
|
||||||
image: postgres:13-bullseye
|
|
||||||
volumes:
|
|
||||||
- postgres:/var/lib/postgresql/data
|
|
||||||
environment:
|
|
||||||
POSTGRES_DB: timetrex
|
|
||||||
POSTGRES_USER: timetrex
|
|
||||||
POSTGRES_PASSWORD: password
|
|
||||||
networks:
|
|
||||||
- postgres
|
|
||||||
|
@@ -1,36 +1,11 @@
|
|||||||
- name: Restart MariaDB
|
|
||||||
ansible.builtin.service:
|
|
||||||
name: mariadb
|
|
||||||
state: restarted
|
|
||||||
listen: restart_mariadb
|
|
||||||
|
|
||||||
- name: Compose up on webserver stack
|
- name: Compose up on webserver stack
|
||||||
ansible.builtin.command: "docker-compose up -d"
|
ansible.builtin.command: "docker-compose up -d"
|
||||||
args:
|
args:
|
||||||
chdir: "{{ webserver_root }}"
|
chdir: "{{ webserver_root }}"
|
||||||
listen: composeup_webserver
|
listen: composeup_webserver
|
||||||
|
|
||||||
- name: Grab Nextcloud container information
|
- name: Restart MariaDB
|
||||||
community.docker.docker_container_info:
|
ansible.builtin.service:
|
||||||
name: "{{ webserver_root | basename }}_nextcloud_1"
|
name: mariadb
|
||||||
listen: composeup_webserver
|
state: restarted
|
||||||
register: nextcloud_info
|
listen: restart_mariadb
|
||||||
|
|
||||||
- name: Wait for Nextcloud to become available
|
|
||||||
ansible.builtin.wait_for:
|
|
||||||
host: "{{ nextcloud_info.container.NetworkSettings.Networks.traefik.IPAddress }}"
|
|
||||||
port: 80
|
|
||||||
listen: composeup_webserver
|
|
||||||
|
|
||||||
- name: Check Nextcloud status
|
|
||||||
ansible.builtin.command: "docker exec --user www-data {{ webserver_root | basename }}_nextcloud_1
|
|
||||||
php occ status"
|
|
||||||
listen: composeup_webserver
|
|
||||||
register: nextcloud_status
|
|
||||||
|
|
||||||
- name: Import Nextcloud installation handlers
|
|
||||||
ansible.builtin.import_tasks: nextcloud.yml
|
|
||||||
listen: composeup_webserver
|
|
||||||
when:
|
|
||||||
- nextcloud_status.stderr[:26] == "Nextcloud is not installed"
|
|
||||||
- nextcloud_autoinstall
|
|
||||||
|
@@ -1,35 +0,0 @@
|
|||||||
- name: Install Nextcloud
|
|
||||||
ansible.builtin.command: 'docker exec --user www-data {{ webserver_root | basename }}_nextcloud_1
|
|
||||||
php occ maintenance:install
|
|
||||||
--database "mysql"
|
|
||||||
--database-host "{{ webserver.NEXTCLOUD_MYSQL_HOST | default("host.docker.internal") }}"
|
|
||||||
--database-name "{{ webserver.NEXTCLOUD_MYSQL_DATABASE | default("nextcloud") }}"
|
|
||||||
--database-user "{{ webserver.NEXTCLOUD_MYSQL_USER | default("nextcloud") }}"
|
|
||||||
--database-pass "{{ webserver.NEXTCLOUD_MYSQL_PASSWORD }}"
|
|
||||||
--admin-user "{{ webserver.NEXTCLOUD_ADMIN | default("admin") }}"
|
|
||||||
--admin-pass "{{ webserver.NEXTCLOUD_ADMIN_PASSWORD }}"'
|
|
||||||
register: nextcloud_install
|
|
||||||
listen: composeup_webserver
|
|
||||||
|
|
||||||
- name: Set Nextcloud's Trusted Domain
|
|
||||||
ansible.builtin.command: 'docker exec --user www-data {{ webserver_root | basename }}_nextcloud_1
|
|
||||||
php occ config:system:set trusted_domains 0
|
|
||||||
--value="{{ webserver.NEXTCLOUD_DOMAIN | default("cloud.local.freeitathens.org") }}"'
|
|
||||||
listen: composeup_webserver
|
|
||||||
when: nextcloud_install.changed
|
|
||||||
|
|
||||||
- name: Set Nextcloud's Trusted Proxy
|
|
||||||
ansible.builtin.command: 'docker exec --user www-data {{ webserver_root | basename }}_nextcloud_1
|
|
||||||
php occ config:system:set trusted_proxies 0 --value="traefik"'
|
|
||||||
listen: composeup_webserver
|
|
||||||
when: nextcloud_install.changed
|
|
||||||
|
|
||||||
- name: Preform Nextcloud database maintenance
|
|
||||||
ansible.builtin.command: "docker exec --user www-data {{ webserver_root | basename }}_nextcloud_1 {{ item }}"
|
|
||||||
loop:
|
|
||||||
- "php occ maintenance:mode --on"
|
|
||||||
- "php occ db:add-missing-indices"
|
|
||||||
- "php occ db:convert-filecache-bigint"
|
|
||||||
- "php occ maintenance:mode --off"
|
|
||||||
listen: composeup_webserver
|
|
||||||
when: "' - needsDbUpgrade: true' in nextcloud_status.stdout_lines"
|
|
100
roles/wordpress/tasks/main.yml
Normal file
100
roles/wordpress/tasks/main.yml
Normal file
@@ -0,0 +1,100 @@
|
|||||||
|
# Copyright (C) 2019 Free I.T. Athens
|
||||||
|
#
|
||||||
|
# This program is free software: you can redistribute it and/or modify
|
||||||
|
# it under the terms of the GNU General Public License as published by
|
||||||
|
# the Free Software Foundation, version 3 of the License.
|
||||||
|
#
|
||||||
|
# This program is distributed in the hope that it will be useful,
|
||||||
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
# GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public License
|
||||||
|
# along with this program. If not, see <https://www.gnu.org/licenses/>.
|
||||||
|
|
||||||
|
|
||||||
|
# PyMySQL or MySQL-python is required for database tasks
|
||||||
|
- name: Install MySQL Support for Python
|
||||||
|
apt:
|
||||||
|
name: python-pymysql
|
||||||
|
state: present
|
||||||
|
|
||||||
|
- name: Create Database
|
||||||
|
mysql_db:
|
||||||
|
name: "{{ wp_db_name }}"
|
||||||
|
state: present
|
||||||
|
login_unix_socket: /var/run/mysqld/mysqld.sock
|
||||||
|
|
||||||
|
- name: Create Database User
|
||||||
|
mysql_user:
|
||||||
|
name: "{{ wp_db_user }}"
|
||||||
|
password: "{{ wp_db_pass }}"
|
||||||
|
priv: "{{ wp_db_name }}.*:ALL,GRANT"
|
||||||
|
state: present
|
||||||
|
login_unix_socket: /var/run/mysqld/mysqld.sock
|
||||||
|
|
||||||
|
- name: Create Public HTML Directory
|
||||||
|
file:
|
||||||
|
path: "{{ wp_dir }}/public_html"
|
||||||
|
state: directory
|
||||||
|
|
||||||
|
- name: Create Logs Directory
|
||||||
|
file:
|
||||||
|
path: "{{ wp_dir }}/logs"
|
||||||
|
state: directory
|
||||||
|
|
||||||
|
- name: Download WordPress
|
||||||
|
get_url:
|
||||||
|
url: https://wordpress.org/wordpress-{{ wp_version }}.tar.gz
|
||||||
|
dest: /tmp/wordpress-{{ wp_version }}.tar.gz
|
||||||
|
checksum: sha1:{{ wp_sha1_hash }}
|
||||||
|
|
||||||
|
- name: Extract WordPress
|
||||||
|
unarchive:
|
||||||
|
src: /tmp/wordpress-{{ wp_version }}.tar.gz
|
||||||
|
dest: "{{ wp_dir }}/public_html"
|
||||||
|
extra_opts: [--strip-components=1]
|
||||||
|
owner: "www-data"
|
||||||
|
group: "www-data"
|
||||||
|
remote_src: yes
|
||||||
|
|
||||||
|
- name: Stat WordPress Salts
|
||||||
|
stat:
|
||||||
|
path: "{{ wp_dir }}/salts.txt"
|
||||||
|
register: salts
|
||||||
|
|
||||||
|
- name: Generate Keys and Salts
|
||||||
|
get_url:
|
||||||
|
url: https://api.wordpress.org/secret-key/1.1/salt/
|
||||||
|
dest: "{{ wp_dir }}/salts.txt"
|
||||||
|
when: not salts.stat.exists
|
||||||
|
|
||||||
|
- name: Grab Keys and Salts
|
||||||
|
slurp: src="{{ wp_dir }}/salts.txt"
|
||||||
|
register: salts
|
||||||
|
|
||||||
|
- name: Apply WordPress Configuration
|
||||||
|
template:
|
||||||
|
src: wp-config.php.j2
|
||||||
|
dest: "{{ wp_dir }}/public_html/wp-config.php"
|
||||||
|
owner: "www-data"
|
||||||
|
group: "www-data"
|
||||||
|
|
||||||
|
- name: Apply Apache Configuration
|
||||||
|
template:
|
||||||
|
src: wordpress.conf.j2
|
||||||
|
dest: /etc/apache2/sites-available/{{ wp_domain }}.conf
|
||||||
|
notify: Reload Apache2
|
||||||
|
|
||||||
|
- name: Enable Apache Module rewrite
|
||||||
|
apache2_module:
|
||||||
|
state: present
|
||||||
|
name: rewrite
|
||||||
|
notify: Reload Apache2
|
||||||
|
|
||||||
|
- name: Enable Apache Website
|
||||||
|
shell: a2ensite {{ wp_domain }}
|
||||||
|
args:
|
||||||
|
creates: /etc/apache2/sites-enabled/{{ wp_domain }}.conf
|
||||||
|
notify: Reload Apache2
|
||||||
|
|
17
roles/wordpress/templates/wordpress.conf.j2
Normal file
17
roles/wordpress/templates/wordpress.conf.j2
Normal file
@@ -0,0 +1,17 @@
|
|||||||
|
<VirtualHost *:80>
|
||||||
|
ServerName {{ wp_domain }}
|
||||||
|
|
||||||
|
ServerAdmin {{ wp_admin_email }}
|
||||||
|
DocumentRoot {{ wp_dir }}/public_html
|
||||||
|
|
||||||
|
ErrorLog {{ wp_dir }}/logs/error.log
|
||||||
|
CustomLog {{ wp_dir }}/logs/access.log combined
|
||||||
|
</VirtualHost>
|
||||||
|
|
||||||
|
<Directory {{ wp_dir }}/public_html>
|
||||||
|
Options Indexes FollowSymLinks
|
||||||
|
AllowOverride All
|
||||||
|
Require all granted
|
||||||
|
</Directory>
|
||||||
|
|
||||||
|
# vim: syntax=apache ts=4 sw=4 sts=4 sr noet
|
64
roles/wordpress/templates/wp-config.php.j2
Normal file
64
roles/wordpress/templates/wp-config.php.j2
Normal file
@@ -0,0 +1,64 @@
|
|||||||
|
<?php
|
||||||
|
|
||||||
|
define('DB_NAME', '{{ wp_db_name }}');
|
||||||
|
|
||||||
|
/** The name of the database for WordPress */
|
||||||
|
/** MySQL database username */
|
||||||
|
define('DB_USER', '{{ wp_db_user }}');
|
||||||
|
|
||||||
|
/** MySQL database password */
|
||||||
|
define('DB_PASSWORD', '{{ wp_db_pass }}');
|
||||||
|
|
||||||
|
/** MySQL hostname */
|
||||||
|
define('DB_HOST', '{{ wp_db_host }}');
|
||||||
|
|
||||||
|
/** Database Charset to use in creating database tables. */
|
||||||
|
define('DB_CHARSET', 'utf8mb4');
|
||||||
|
|
||||||
|
/** The Database Collate type. Don't change this if in doubt. */
|
||||||
|
define('DB_COLLATE', '');
|
||||||
|
|
||||||
|
/**#@+
|
||||||
|
* Authentication Unique Keys and Salts.
|
||||||
|
*
|
||||||
|
* Change these to different unique phrases!
|
||||||
|
* You can generate these using the {@link https://api.wordpress.org/secret-key/1.1/salt/ WordPress.org secret-key service}
|
||||||
|
* You can change these at any point in time to invalidate all existing cookies. This will force all users to have to log in again.
|
||||||
|
*
|
||||||
|
* @since 2.6.0
|
||||||
|
*/
|
||||||
|
{{ salts.content | b64decode }}
|
||||||
|
|
||||||
|
/**#@-*/
|
||||||
|
|
||||||
|
/**
|
||||||
|
* WordPress Database Table prefix.
|
||||||
|
*
|
||||||
|
* You can have multiple installations in one database if you give each
|
||||||
|
* a unique prefix. Only numbers, letters, and underscores please!
|
||||||
|
*/
|
||||||
|
$table_prefix = '{{ wp_db_table_prefix }}';
|
||||||
|
|
||||||
|
/**
|
||||||
|
* For developers: WordPress debugging mode.
|
||||||
|
*
|
||||||
|
* Change this to true to enable the display of notices during development.
|
||||||
|
* It is strongly recommended that plugin and theme developers use WP_DEBUG
|
||||||
|
* in their development environments.
|
||||||
|
*
|
||||||
|
* For information on other constants that can be used for debugging,
|
||||||
|
* visit the Codex.
|
||||||
|
*
|
||||||
|
* @link https://codex.wordpress.org/Debugging_in_WordPress
|
||||||
|
*/
|
||||||
|
define('WP_DEBUG', false);
|
||||||
|
|
||||||
|
/* That's all, stop editing! Happy blogging. */
|
||||||
|
|
||||||
|
/** Absolute path to the WordPress directory. */
|
||||||
|
if ( !defined('ABSPATH') )
|
||||||
|
define('ABSPATH', dirname(__FILE__) . '/');
|
||||||
|
|
||||||
|
/** Sets up WordPress vars and included files. */
|
||||||
|
require_once(ABSPATH . 'wp-settings.php');
|
||||||
|
|
@@ -1,51 +0,0 @@
|
|||||||
#!/bin/bash
|
|
||||||
BW_USERNAME="contact@freeitathens.org"
|
|
||||||
ANSIBLE_VAULT_ITEM="e16b2542-f6c1-4e9f-8e33-af5201574a15"
|
|
||||||
|
|
||||||
# Does the key already exist?
|
|
||||||
if [ -f .ansible_vault ]; then
|
|
||||||
echo "Ansible Vault file already exists at ./.ansible_vault"
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
|
|
||||||
# Install Bitwarden CLI binary to ./.bitwarden/bw
|
|
||||||
if [ ! -d .bitwarden ]; then
|
|
||||||
mkdir .bitwarden
|
|
||||||
cd .bitwarden || exit 1
|
|
||||||
wget "https://vault.bitwarden.com/download/?app=cli&platform=linux" -O bw-linux.zip
|
|
||||||
unzip bw-linux.zip
|
|
||||||
rm bw-linux.zip
|
|
||||||
chmod u+x bw
|
|
||||||
else
|
|
||||||
cd .bitwarden || exit 1
|
|
||||||
fi
|
|
||||||
|
|
||||||
# Get Master Password to unlock vault
|
|
||||||
read -rsp "Master Password: " BW_PASSWORD
|
|
||||||
export BW_PASSWORD
|
|
||||||
echo
|
|
||||||
|
|
||||||
# Login
|
|
||||||
LOGIN_RESPONSE=$(./bw login "$BW_USERNAME" "$BW_PASSWORD" --response --nointeraction)
|
|
||||||
if [ ! "$(echo "$LOGIN_RESPONSE" | jq -r .success)" == "true" ]; then
|
|
||||||
echo "$LOGIN_RESPONSE" | jq -r .message
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
|
|
||||||
# Unlock
|
|
||||||
UNLOCK_RESPONSE=$(./bw unlock --passwordenv BW_PASSWORD --response --nointeraction)
|
|
||||||
if [ ! "$(echo "$UNLOCK_RESPONSE" | jq -r .success)" == "true" ]; then
|
|
||||||
echo "$UNLOCK_RESPONSE" | jq -r .message
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
|
|
||||||
# Trade password for session
|
|
||||||
unset BW_PASSWORD
|
|
||||||
BW_SESSION=$(echo "$UNLOCK_RESPONSE" | jq -r .data.raw)
|
|
||||||
export BW_SESSION
|
|
||||||
|
|
||||||
# Place Ansible Vault secret and logout
|
|
||||||
./bw get password "$ANSIBLE_VAULT_ITEM" --response --nointeraction | jq -r .data.data > ../.ansible_vault
|
|
||||||
truncate -s -1 ../.ansible_vault
|
|
||||||
chmod 600 ../.ansible_vault
|
|
||||||
./bw logout --quiet
|
|
Reference in New Issue
Block a user